Hacking the Casinos for a Million Bucks: Case Analysis

Pages: 4 (1693 words) Published: July 11, 2010
Hacking the Casinos for a Million Bucks
This case is about four guys, Alex, Mike, Marco and Larry who worked as consultants in high-tech in the early 1990s and played life loose and casual. Alex, Mike and Marco were good programmers while Larry was a great organizer. One time they were offered an assignment from a technology firm to develop some software and then accompany it to Las Vegas for a trade show. As we know, Las Vegas is the most populous city in Nevada and an internationally renowned major resort city for gambling; it bills itself as The Entertainment Capital of the World, because of its fame for the number of casino resorts and associated entertainment. While in Las Vegas, a challenge from Alex’s wife to try and do something about the casinos so that they would win more was put across. This challenge triggered the four guys and got them curious. They then decided to look into it. With their good research work, programming skills and intellects with some social engineering techniques that they used well, they finally did hack the casino system. Thus, as I read through the case, I came to understand that information security is a paramount issue for any organization, or company despite its size. According to Mitnick, a legendary hacker and security specialist “When it comes to information security, most security executives invest the bulk of their time and budget dollars on thwarting technological factors that can snatch data.” [1]. NO assumptions should be made when it comes to handling or putting in place security measures. The conceptual framework that Alex and his team had was that they would find a “backdoor” which is a software code that allows a later access to the program, that some programmer may have put in for his own benefit. They thought that somehow they might stumble on such a “backdoor” or a simple programming flaw that they could exploit. They also figured out that the slot machines were run by some computer programs and it is easier...

References: Internet Resources
1. http://mitnicksecurity.com/media/CSC-Testimonial.pdf
2. http://en.wikipedia.org/wiki/Garbage_In,_Garbage_Out
3. http://en.wikipedia.org/wiki/Social_engineering_%28security%29
4. Mitnick, K. & Simon, W. The Art of Deception, Controlling The Human Element of Security [chapter 16]
5. Mitnick, K & Simon, W. The Art of Intrusion, Real Stories Behind the Exploits of Hackers, Intruders & Deceivers [chapter 1]
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Hacking Essay
  • Casino Industry Case Analysis Essay
  • Buck&Pulleyn's Case Analysis Essay
  • First Solar Powered Case: An Analysis Essay
  • Casino Analysis Essay
  • Bellagio Casino Resort Case Essay
  • Case Analysis ESRI Essay
  • Essay on hi Value case analysis

Become a StudyMode Member

Sign Up - It's Free